ALT-BU-2024-14666-1
Branch c10f1 update bulletin.
Closed vulnerabilities
BDU:2024-03243
Уязвимость драйвера AuthentIC набора программных инструментов и библиотек для работы со смарт-картами OpenSC, позволяющая нарушителю позволить скомпрометировать операции по управлению картами
Modified: 2024-11-21
CVE-2023-5992
A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.
- RHSA-2024:0966
- RHSA-2024:0966
- RHSA-2024:0967
- RHSA-2024:0967
- https://access.redhat.com/security/cve/CVE-2023-5992
- https://access.redhat.com/security/cve/CVE-2023-5992
- RHBZ#2248685
- RHBZ#2248685
- https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992
- https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/
- https://www.usenix.org/system/files/usenixsecurity24-shagam.pdf
Modified: 2024-11-21
CVE-2024-1454
The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.
- https://access.redhat.com/security/cve/CVE-2024-1454
- https://access.redhat.com/security/cve/CVE-2024-1454
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898
- RHBZ#2263929
- RHBZ#2263929
- https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9
- https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/
Closed vulnerabilities
BDU:2024-06879
Уязвимость текстового редактора Nano, связанная с ошибками обработки временных файлов, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2024-5742
A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.
Closed bugs
Прошу обновить пакет nano до версии 8.0
Package openvpn-gostcrypto updated to version 2.4.9-alt4 for branch c10f1 in task 360434.
Closed vulnerabilities
BDU:2021-02221
Уязвимость функции отложенной аутентификации deferred_auth программного обеспечения OpenVPN, позволяющая нарушителю вынудить сервер вернуть сообщение PUSH_REPLY c данными о настройках VPN до отправки сообщения AUTH_FAILED
Modified: 2024-11-21
CVE-2020-15078
OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
- https://community.openvpn.net/openvpn/wiki/CVE-2020-15078
- https://community.openvpn.net/openvpn/wiki/CVE-2020-15078
- https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements
- https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements
- [debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update
- [debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update
- FEDORA-2021-242ef81244
- FEDORA-2021-242ef81244
- FEDORA-2021-d6b9d8497b
- FEDORA-2021-d6b9d8497b
- FEDORA-2021-b805c26afa
- FEDORA-2021-b805c26afa
- GLSA-202105-25
- GLSA-202105-25
- https://usn.ubuntu.com/usn/usn-4933-1
- https://usn.ubuntu.com/usn/usn-4933-1